Tag: cybersecurity

If you’re a casino in the U.S., or a casino that is part of a U.S. group, you’re almost always classified as a NBFI, and have to follow KYC norms, under the BSA rules, file CTRs and SARCs. If you’ve ever wondered why you need to know what these terms stand for, and why you…

Like this:

The central government expects Karnataka to be in top five in the implementation of new and renewable energy programmes the minister added. India has the target of producing 1,75,000 MW and Renewable energy in next five years. The government also launched Solar Mission to generate 1 lakh MW solar power in the country. Similarly wind…

Like this:

The report from the University of Cambridge Center for Risk Studies and the Lloyd’s of London insurance market outlines a scenario of an electricity blackout that leaves 93 million people in New York City and Washington DC without power. The scenario, developed by Cambridge, is technologically possible and is assessed to be within the once-in-200-year…

Like this:

“Your Network Hacked By Yemen Cyber Army,” reads the first batch of data released by the hacking group. “We Are Anonymous. We Are Everywhere. We Are Legion. We do Not Forgive. We do Not Forget. Stop Attacking To Our Country!” The group claims to have obtained the information through the Saudi Ministry of Foreign Affairs…

Like this:

“Your Network Hacked By Yemen Cyber Army,” reads the first batch of data released by the hacking group. “We Are Anonymous. We Are Everywhere. We Are Legion. We do Not Forgive. We do Not Forget. Stop Attacking To Our Country!” The group claims to have obtained the information through the Saudi Ministry of Foreign Affairs…

Like this:

Kaspersky named “Red October” this years top cybersecurity threat. Red October was a large scale cyber-espionage network that target various international diplomatic service agencies. This cyber-espionage network was used to analyze and reveal various aspects of the the global critical infrastructure. Initial it was thought that the network was largely focused on Eastern Europe and…

Like this:

It was Aug. 17, 2009 — just over four years ago. The location was Siberia, at the sixth largest hydro-dam in the world. It’s a place called Sayano-Shushenskaya. The tips of the turbine that the witness saw spinning moved at near-supersonic speed, generating 475 megawatts of power. That’s enough electricity to light up a city of more…

Responding to an epidemic or bioterrorist attack with moderate travel restrictions could effectively control contagion in densely populated areas, according to a study published on Wednesday in the Journal of the Royal Society Interface. The Massachusetts Institute of Technology study compared contagion rates in two scenarios, one with travel restrictions and one without the restrictions. Previous research showed…

Like this:

With the increasing importance of information and communication technologies both on and off the battlefield, new research forecasts continued robust global spending on cyber warfare systems until 2023, with the market expanding from US$11.1 billion in 2013 to US$19.4 billion by 2023 – a CAGR of 5.77%. This significant growth is further fuelled by a…

Like this:

U.S. Air Force researchers are asking industry for ideas on a broad range of computer and information technologies to enable U.S. and allied warfighters to avoid, fight through, survive, and recover from advanced cyber threats. Researchers are asking industry for white papers that describe technologies for innovative and potentially disruptive technologies that support trusted architectures for high-assurance, secure, and…